{"title":"3D object modeling using multi-mother wavelet network","authors":"Mohamed Othmani, W. Bellil, C. Amar, A. Alimi","doi":"10.1109/AICCSA.2010.5586961","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586961","url":null,"abstract":"This paper deals with an experiment which proves that wavelet networks are capable for 3D objects modeling. To prove this, we will propose a new structure of wavelet network founded on several mother wavelets families. This new structure is in some ways similar to the classic wavelet networks but it admits some originality. Actually, wavelet network basically uses dilations and translations versions of only one mother wavelet to construct the network. The proposed structure uses several mother wavelets, in order to maximize best wavelets selection probability. An algorithm to construct this structure is presented. First, 3D object model vertices and their corresponding normal values are used to create a training set. Then, an improved Orthogonal Least Squares method version is applied to optimize wavelet selection for every mother wavelet. Some simulation results will describe the proposed wavelet network performance employing several types of Polywogs as mother wavelets.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized resource management using a borrowing schema","authors":"Narkoy Batouma, J. Sourrouille","doi":"10.1109/AICCSA.2010.5586980","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586980","url":null,"abstract":"Resource management is a main issue when distributed applications should meet some Quality of Service (QoS) constraints. Centralized approaches are widely used for many good reasons, but decentralized approaches are often more reliable. A local view of the system from a node is not sufficient to make sound decisions. To synchronize their actions, nodes must exchange data with each other. Exchanging data incurs a cost; hence, to reduce the amount of exchanged data is desirable. This paper presents a distributed middleware to manage resources in a decentralized manner, using an approximate scheduling and a resource-borrowing scheme to improve the total QoS of the system. On each node, managers construct a comprehensive view of resource availability in the whole system. Our borrowing scheme aims to guarantee that as many applications as possible meet their deadline, to reject as few applications as possible, while decreasing the exchange costs and increasing the use of resources. Simulations show the usefulness of the approach and give encouraging results.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133860680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient source authentication scheme in wireless sensor networks","authors":"Wafa Ben Jaballah, A. Meddeb, H. Youssef","doi":"10.1109/AICCSA.2010.5586993","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586993","url":null,"abstract":"Wireless sensor networks (WSN) are being widely deployed in military, healthcare and commercial environments. Since sensor networks pose unique challenges, traditional security methods, commonly used in enterprise networks, cannot be directly applied. In particular, broadcast source authentication is a critical security service in wireless sensor networks since it allows senders to broadcast messages to multiple receivers in a secure way. Public-key cryptography based solutions such as Elliptic Curve Cryptography (ECC) and Identity Based Cryptography (IBC) have been proposed but they all suffer from severe energy depletion attacks, resulting from a high computational and communication overheads. In this paper, we present a novel symmetric-key-based authentication scheme that exhibits low broadcast authentication overhead and thus avoiding the problem flaws inherent to the public key cryptography based schemes. Our scheme is built upon the integration of multi-level μTesla protocol, staggered authentication and the Bloom Filter. We show that our authentication scheme is very efficient in terms of energy consumption related to both computation and communication.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133887039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Freshness-aware metadata management: Performance evaluation with SWN models","authors":"O. Diallo, M. Sene, Idrissa Sarr","doi":"10.1109/AICCSA.2010.5586954","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586954","url":null,"abstract":"Recent systems which are in general composed by several resources and distributed over a large-scale network, need high-level models to be studied. In these complex systems such as peer-to-peer systems, efficient and fast query routing is necessary for managing applications workload. Many works have been proposed to deal with query routing, however none of these studies rely on Stochastic Well formed Petri Nets (SWN) for modelling the approach proposed. We aim in this paper, to propose an algorithm for managing metadata needed to route queries. Moreover we use SWN models to evaluate and validate our approach. Our solution is freshness-aware, thus gains in the fact that stale data can be read under some limits. These limits are wideley taken into account for managing metadata coherently. Our study takes into account the concurrency, the synchronization, the parallelism, the identity of the resources and their cooperation. We propose two SWN models for structuring metadata: one with strong consistency and another with weak consistency. Simulations are used to validate our approach and the results obtainded demonstrate the fesability of our solution.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124587902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture conformance checking of multi-language applications","authors":"Razieh Rahimi, R. Khosravi","doi":"10.1109/AICCSA.2010.5587025","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587025","url":null,"abstract":"As the development in a software project goes on, the structure of the implemented code diverges from the intended architecture. To prevent this, architecture conformance methods are used to check if the source code complies with the architecture. In the development of today's enterprise applications, general-purpose programming languages are used along with a number of domain specific languages. So, there is a need for a conformance checking method to support multi-language source artifacts. We present a model-based approach for checking cross-language architecture conformance rules. Our method is extensible, in the sense that it is independent of the specific set of languages used in the project.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114310460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Pruned Bilinear Recurrent Neural Network to load prediction","authors":"Jae-Young Kim, Dong-Chul Park, Dong-Min Woo","doi":"10.1109/AICCSA.2010.5586969","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586969","url":null,"abstract":"Prediction of electric load by using Pruned Bilinear Recurrent Neural Network (PBRNN) is proposed and presented in this paper. The PBRNN was developed to alleviate the computational cost associated with the Bilinear Recurrent Neural Network by using a pruning procedure. Since electric loads have a time-series characteristic, a prediction scheme based on the PBRNN can be an optimal candidate for the electric load prediction problem. Experiments are conducted on a load data set from the North-American Electric Utility (NAEU). Results show that the Pruned BRNN-based prediction scheme outperforms the conventional Multi- Layer Perceptron Type Neural Network (MLPNN) in terms of the Mean Absolute Percentage Error(MAPE).","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feedback architecture for multimedia systems","authors":"B. Alaya, Claude Duvallet, B. Sadeg","doi":"10.1109/AICCSA.2010.5587035","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587035","url":null,"abstract":"Multimedia applications usually manage large quantities of data in the form of frames of certain types. To ensure a flowing traffic of these frames through the network, temporal constraints must be respected when sending and receiving these frames. If the temporal constraints are not met, then the quality of service (QoS) provided to users decreases. In this paper, we exploit some results obtained in QoS management in Real-Time Databases Systems (RTDBSs), and we apply them to multimedia applications, because of similarities existing between these two fields. We propose a new method allowing to control the QoS provided to clients according to the system congestion. To this purpose, we implement a feedback architecture into a master server, allowing us to adapt the quality of service in the distributed multimedia system according to the network state.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129738585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. El-Gendy, O. Ibrahim, Nabil El-Kadhi, N. Debnath
{"title":"Management scheme for intelligent terminals for the information super-highways","authors":"H. El-Gendy, O. Ibrahim, Nabil El-Kadhi, N. Debnath","doi":"10.1109/AICCSA.2010.5586991","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586991","url":null,"abstract":"An IN (Intelligent Networks) management scheme for ISO Interface is presented in this paper. The interface is for interactions, via services called Input/Output Services, between desktop applications and voice terminals. These services allow computer applications to provide users with enhanced services by exploitation of the characteristics of a variety of telephony device types. This is by interacting with a switch-based software object, called Information-Path, associated with the device that allows input to be received from the device and output to be sent to the device. The management scheme is suitable for multimedia interactive telecommunications. It covers applications that involve only voice calls (ISDN B channel), only data calls (ISDN D channel), and both voice calls and data calls (both ISDN B channel and ISDN D channel). So, it is suitable for multimedia communications that involve voice, data, and graphics. The applicability is demonstrated by applications scenarios that involve multimedia mail.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126961190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing - an IT paradigm changer","authors":"Mazin S. Yousif","doi":"10.1109/AICCSA.2010.5587050","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587050","url":null,"abstract":"Cloud Computing is an emerging computing paradigm envisioned to change all IT landscape facets including technology, business, services and human resources. It is a consumer/delivery model that offers IT capabilities as services, billed based on usage. Many such cloud services can be envisioned, but the leading ones are IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), and SaaS (Software-as-a-Service).","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time execution models for co-simulation","authors":"Cyril Faure, N. Pernet","doi":"10.1109/AICCSA.2010.5586968","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586968","url":null,"abstract":"In order to reduce development cycle, powertrain control and optimization is increasingly based on system modeling and several steps of simulation are needed. As an intermediate step, real-time simulation aim to prepare further test bed validations embedding the actual engine. This article discusses the challenge to find a real-time execution model offering the determinism needed to maintain the numerical results observed in offline simulation and still managing to meet real-time constraints. We first propose a conservative real-time execution model, totally deterministic but pessimistic in term of computational resources management. Then, since we need better use of these resources in order to achieve real-time simulation of representative complex models, we present different alternatives and discuss the advantages and drawbacks of each of them.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}